Bitcoin Forum
June 24, 2024, 04:38:51 PM *
News: Voting for pizza day contest
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 96 »
  Print  
Author Topic: BitCrack - A tool for brute-forcing private keys  (Read 74620 times)
klfklf
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
July 19, 2020, 09:42:42 AM
 #461

Hi...

İ need to bitcrack random version

where can i find this random version? i cant find github

please help...
iamfreshfish
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
July 20, 2020, 07:36:38 AM
 #462

Hello,
Can anyone explain the relationship between -b -t and -p and GPU work groups? I tried doing some research to try and optimize this but couldnt figure out the relationship and I dont have the coding know how to code a simple benchmarking utility that would test the ranges.

My understanding is that GPUs have compute units and workgroups are distribute across these units...and each workgroup consists of blocks and I think threads.

I assumed that if I learned a little about workgroup sizing as well as knowing the compute units for my gpu (I have an RX 580 so it has 36 CU with 2304 SMs) I could better determine a good configuration.

Thanks
GoVanza
Newbie
*
Offline Offline

Activity: 149
Merit: 0


View Profile
July 20, 2020, 08:59:54 AM
 #463

Hello,
Can anyone explain the relationship between -b -t and -p and GPU work groups? I tried doing some research to try and optimize this but couldnt figure out the relationship and I dont have the coding know how to code a simple benchmarking utility that would test the ranges.

My understanding is that GPUs have compute units and workgroups are distribute across these units...and each workgroup consists of blocks and I think threads.

I assumed that if I learned a little about workgroup sizing as well as knowing the compute units for my gpu (I have an RX 580 so it has 36 CU with 2304 SMs) I could better determine a good configuration.

Thanks
The best speed for you would be -b 64 -t 256 -p 2048. only the creator knows the intricacies of verification. But BitCrack no longer works fine, it does not show the correct digits for scanning.
iamfreshfish
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
July 20, 2020, 09:24:14 AM
 #464


 The best speed for you would be -b 64 -t 256 -p 2048. only the creator knows the intricacies of verification. But BitCrack no longer works fine, it does not show the correct digits for scanning.

Thanks, but I am trying to learn a little bit about how workloads are distributed to GPUs as well as optimizing my gpu...so could you explain how you decided on those values or was it trial and error with a similar gpu?
GoVanza
Newbie
*
Offline Offline

Activity: 149
Merit: 0


View Profile
July 20, 2020, 05:00:16 PM
 #465


 The best speed for you would be -b 64 -t 256 -p 2048. only the creator knows the intricacies of verification. But BitCrack no longer works fine, it does not show the correct digits for scanning.

Thanks, but I am trying to learn a little bit about how workloads are distributed to GPUs as well as optimizing my gpu...so could you explain how you decided on those values or was it trial and error with a similar gpu?

I did a test of finding 40 keys from the puzzle32. Did many times different parameters. Conclusion is the best speed. My card is similar to yours RX 570 Nitro+ 8GB. The big minus of BitCrack is that it does not show the correct calculations. and conservation does on incorrect calculations. after restart you will start from the saved file. Thus, the key can be skipped.
COBRAS
Member
**
Offline Offline

Activity: 886
Merit: 22


View Profile
July 20, 2020, 06:55:07 PM
 #466

Hi all. I think bast choise for crack btc use random search because too many calculation needed. Without random crack is full shet.

[
GoVanza
Newbie
*
Offline Offline

Activity: 149
Merit: 0


View Profile
July 20, 2020, 06:58:45 PM
 #467

Hi all. I think bast choise for crack btc use random search because too many calculation needed. Without random crack is full shet.

I can not compile version files from Pikachypika/ And in this program BitCrack there is no such function random(
COBRAS
Member
**
Offline Offline

Activity: 886
Merit: 22


View Profile
July 20, 2020, 09:52:06 PM
 #468

Hi all. I think bast choise for crack btc use random search because too many calculation needed. Without random crack is full shet.

I can not compile version files from Pikachypika/ And in this program BitCrack there is no such function random(

Dont waste time to no random bitcrack. This is full shet. Fined a programmist who compile for you Pikachypka version and work, no other variants with no random search bitcrack. With random search will be a chance, without random search no chances.

[
bigvito19
Full Member
***
Offline Offline

Activity: 706
Merit: 111


View Profile
July 20, 2020, 10:10:12 PM
Last edit: July 24, 2020, 06:38:09 PM by bigvito19
 #469

Everyone knows that bitcrack only goes by consecutive keys. You can make your own program it you want to go random but it will be much slower vs consecutive keys/incremental.
PawGo
Legendary
*
Offline Offline

Activity: 952
Merit: 1369


View Profile
July 24, 2020, 06:24:38 PM
 #470

Everyone knows that bitcrack only goes by consecutive keys.

Not really. You may specify your own 'distance' between key.
For example:
Code:
--stride F4240
will do 1000000 keys long 'jump' between tries.
GoVanza
Newbie
*
Offline Offline

Activity: 149
Merit: 0


View Profile
July 24, 2020, 06:58:34 PM
 #471

Everyone knows that bitcrack only goes by consecutive keys.

Not really. You may specify your own 'distance' between key.
For example:
Code:
--stride F4240
will do 1000000 keys long 'jump' between tries.

After reaching the end of the program range, just stop (((
bigvito19
Full Member
***
Offline Offline

Activity: 706
Merit: 111


View Profile
July 24, 2020, 08:05:23 PM
 #472

Everyone knows that bitcrack only goes by consecutive keys.

Not really. You may specify your own 'distance' between key.
For example:
Code:
--stride F4240
will do 1000000 keys long 'jump' between tries.


That's still consecutive not random
WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1078
Merit: 219

Shooters Shoot...


View Profile
July 24, 2020, 10:51:37 PM
 #473

I'm pretty sure I've posted this or something similar, to use Bitcrack in a "random" way.

This particular GPU is on a system  running Windows 10 and Python 3.8.2.

The code:

Code:
import sys, time, random, os
from datetime import datetime
random.seed(datetime.now())
arq1 = open('randomrange.bat', 'w')
arq2 = open('randomrangeschecked.txt', 'a')

for x in range(1):
    low  = 0x800ffffff
    high = 0xfff000000
    randp = str(hex( random.randrange( low, high ) )).lstrip("0x")
    arq1.write("start /min /wait cuBitcrack -d 1 -b 64 -t 128 -p 256 --keyspace " + randp + "0000000:+FFFFFFF -i 64.txt -o YOUFOUNDTHEKEY.txt")
    arq2.write(randp + "0000000" '\n')
    arq2.write(randp + "FFFFFFF" '\n')
arq1.close()

This particular setting randomly checks a random 2^28 range, in a 2^64 range. You can adjust any of the code to meet your particular needs.

Then I have a CALL batch file that calls the python script and then the batch file that was created from the python script and it's an unlimited loop, checking an unlimited amount of random ranges until you stop the program.

The arq2 in this code saves all the ranges in a text file so you can check to see which ranges have been checked.

BASE16
Member
**
Offline Offline

Activity: 180
Merit: 38


View Profile
July 25, 2020, 06:17:35 PM
 #474

While it is true that you can randomly just try private key's / numbers this is most likely the way with the least chance on success.

It was designed to withstand these types of attacks and the chances are extremely slim that you will accidentally land on a key that has some value to it.
This does not mean that it is impossible, i am just trying to say that you could try and swap the random key method with a more targeted approach.

In simple terms this means you analyze a system, and find it's weakest part, and start banging on that part for as long and as hard as you can in the hopes that it will give way.

By all means many private key's were not chosen randomly at all, many key's were calculated by using known algorithms, this leaves specific footprints, and some key types were even quenched further, by ruling out a rather large part of the possible solutions.
The designers assumed that it would be safer, but it actually makes things easier from a hackers perspective, by ruling out a large part of the key's you generate because they do not fit the lock type involved so they can be discarded before producing the heat and burning the way to the target key.

Of course this is not the case with a randomly chosen brute force attack, with or without jumps, like the thing in this thread, which could be anything, no footprint or target reduction involved, it will literally take forever.

When you carefully analyze the blockchain, you can discover clusters or 'vaults' which are very evidently present and they will show you that something is there and that it follows specific mechanisms, not random at all and if you are good in math, you can calculate the parameters of every one of these clusters and their strength so that you can point your computing power in more serious directions then just wasting it by shooting in the dark.

 Smiley
WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1078
Merit: 219

Shooters Shoot...


View Profile
July 25, 2020, 10:33:16 PM
 #475

While it is true that you can randomly just try private key's / numbers this is most likely the way with the least chance on success.

It was designed to withstand these types of attacks and the chances are extremely slim that you will accidentally land on a key that has some value to it.
This does not mean that it is impossible, i am just trying to say that you could try and swap the random key method with a more targeted approach.

In simple terms this means you analyze a system, and find it's weakest part, and start banging on that part for as long and as hard as you can in the hopes that it will give way.

By all means many private key's were not chosen randomly at all, many key's were calculated by using known algorithms, this leaves specific footprints, and some key types were even quenched further, by ruling out a rather large part of the possible solutions.
The designers assumed that it would be safer, but it actually makes things easier from a hackers perspective, by ruling out a large part of the key's you generate because they do not fit the lock type involved so they can be discarded before producing the heat and burning the way to the target key.

Of course this is not the case with a randomly chosen brute force attack, with or without jumps, like the thing in this thread, which could be anything, no footprint or target reduction involved, it will literally take forever.

When you carefully analyze the blockchain, you can discover clusters or 'vaults' which are very evidently present and they will show you that something is there and that it follows specific mechanisms, not random at all and if you are good in math, you can calculate the parameters of every one of these clusters and their strength so that you can point your computing power in more serious directions then just wasting it by shooting in the dark.

 Smiley
show us the way ole wise one
studyroom1
Jr. Member
*
Offline Offline

Activity: 40
Merit: 7


View Profile
August 20, 2020, 04:56:53 PM
 #476

Everyone knows that bitcrack only goes by consecutive keys.

Not really. You may specify your own 'distance' between key.
For example:
Code:
--stride F4240
will do 1000000 keys long 'jump' between tries.


That's still consecutive not random

how you are calculating --stride F4240 = 1m
how about for 1 billion or for 50billion? please tell me how to calculate any guide
PawGo
Legendary
*
Offline Offline

Activity: 952
Merit: 1369


View Profile
August 20, 2020, 05:53:21 PM
 #477

Everyone knows that bitcrack only goes by consecutive keys.

Not really. You may specify your own 'distance' between key.
For example:
Code:
--stride F4240
will do 1000000 keys long 'jump' between tries.


That's still consecutive not random

how you are calculating --stride F4240 = 1m
how about for 1 billion or for 50billion? please tell me how to calculate any guide

 Shocked http://jfgi.herokuapp.com/

https://www.google.com/search?q=decimal+to+hex+calculator

https://www.rapidtables.com/convert/number/decimal-to-hex.html

1000000000 = 3B9ACA00
50000000000 = BA43B7400
studyroom1
Jr. Member
*
Offline Offline

Activity: 40
Merit: 7


View Profile
August 21, 2020, 04:33:07 AM
Last edit: August 21, 2020, 04:56:33 AM by studyroom1
 #478

Everyone knows that bitcrack only goes by consecutive keys.

Not really. You may specify your own 'distance' between key.
For example:
Code:
--stride F4240
will do 1000000 keys long 'jump' between tries.


That's still consecutive not random

how you are calculating --stride F4240 = 1m
how about for 1 billion or for 50billion? please tell me how to calculate any guide

 Shocked http://jfgi.herokuapp.com/

https://www.google.com/search?q=decimal+to+hex+calculator

https://www.rapidtables.com/convert/number/decimal-to-hex.html

1000000000 = 3B9ACA00
50000000000 = BA43B7400

this one is very strange check this out

clBitCrack.exe --stride BA43B7400 -b 52 -t 512 -p 1024 --compression both --keyspace 0100000000000000000000000000000000000000000000000000000000000000:FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364140 -i 1.txt -o 01.txt

i loaded these addresses to check this one is working or not and guess what if i load 6 or 8 address its working as i expect but if i load more than 6  addressess it is not working ,

1CTGjE4t65gvTzGRCP2rr1UmwYRHRwR2gB
1Bst22LeSjptwhSbAe4XXArjBpnnKDF42X
1FoWHbebHzAuNzg4sX8R2bxBDBCdFQejTv
1CTkWpdNYsM7u9zw3DTiJhEZFA1YJTzBcU
16MAA9YeMSp7VtnQsBSYXgEGg6f1dFdwR1
1B8XXy9YykVF1qk6qm9N3HZ5Bx55mmjDpW
14B12QMdUbtnpAVv7wkowQtG1B94GP2Sa9
1Ap9DW4YjtuGxxVR9hL3CLjMTM8z1kQZfE
1KDpXzUdjcxkbC7NhTL8T7DiVNh1ERAmEs

some addresses i chose as they are coming in stride range jump and some i chose right after or before  stride jump , so question is if GPU doing stride jump and than calculating million of addresses this should also show address right after stride jump or right before stride jump, but in all cases it is showing only ,exact jump address only nothing before or nothing after . and my guess is GPU is checking first only compress range and than non compress range , strange thing lol. and in my guess Gpu is only searching for one address when you will give stride range jump in command and will find key than this will start search for 2nd address , please clarify
PawGo
Legendary
*
Offline Offline

Activity: 952
Merit: 1369


View Profile
August 21, 2020, 07:50:12 AM
 #479

Of course, what did you expect?
By default stride = 1, which means you check numbers ...,3,4,5,6,7.....
but if you specify stride 5, program checks 5,10,15,20,25... Why you expect to have number 9 or 11 checked?
If your public key is generated from number 20, it will be found, if from 21 - not. It is obvious.
studyroom1
Jr. Member
*
Offline Offline

Activity: 40
Merit: 7


View Profile
August 21, 2020, 03:41:06 PM
 #480

Of course, what did you expect?
By default stride = 1, which means you check numbers ...,3,4,5,6,7.....
but if you specify stride 5, program checks 5,10,15,20,25... Why you expect to have number 9 or 11 checked?
If your public key is generated from number 20, it will be found, if from 21 - not. It is obvious.


ok wait do you mean if my gpu is checking 20m keys /sec with 5 jump
so in normal this will be 1,2,3,4,5,6.......20000000
but with 5 Jump this will be 5,10,15,20,25,30........100000000

right?

Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 96 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!